Sciweavers

815 search results - page 125 / 163
» A model for dynamic and adaptable services management
Sort
View
COMAD
2008
15 years 1 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
RTAS
2011
IEEE
14 years 3 months ago
Deterministic and Stochastic QoS Provision for Real-Time Control Systems
—In this paper, we propose two adaptive scheduling approaches to support real-time control applications with highly varying computation times. The use of a resource reservation s...
Daniele Fontanelli, Luigi Palopoli, Luca Greco
CIKM
2008
Springer
15 years 1 months ago
Modeling LSH for performance tuning
Although Locality-Sensitive Hashing (LSH) is a promising approach to similarity search in high-dimensional spaces, it has not been considered practical partly because its search q...
Wei Dong, Zhe Wang, William Josephson, Moses Chari...
NETWORKING
2000
15 years 1 months ago
A Reliable Subcasting Protocol for Wireless Environments
This paper presents an end-to-end reliable multicast protocol for use in environments with wireless access. It divides a multicast tree into sub-trees where subcasting within these...
Djamel Fawzi Hadj Sadok, Carlos de M. Cordeiro, Ju...
MDBIS
2004
149views Database» more  MDBIS 2004»
15 years 1 months ago
Enhanced User Support for Mobile Ad-hoc-Processes
: In ubiquitous application scenarios, the information (processing) needs of nomadic users often cannot be satisfied by a set of pre-installed processes like in common workflow sys...
Klaus Haller, Michelle Ackermann, Claudio Munari, ...